Security

Anonymization of Continuously Disseminating Database Using Product Homomorphic Encryption Scheme

Download Now Free registration required

Executive Summary

k-anonymization optimization algorithm, serves as a vital-privacy protection mechanism in data privacy reservation. Apart from homogeneity background knowledge attacks to which k-anonymizationis vulnerable to, it considers only single static release, thereby protecting data up to the first release or the first recipient-only but in practice, data sources are dynamically growing rapidly every day and every hour, and the updated data may be published as and when updated at the same time preserving the anonymity. An improved method for privacy protection proposed in the literature issky stream k-anonymity facilitating k-anonymity on data streams.

  • Format: PDF
  • Size: 516.45 KB